We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free. Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().
Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-02-11 | Assigner Linuxgit.kernel.org/...c/ac3eaac4cf142a15fe67be747a682b1416efeb6e
git.kernel.org/...c/6021ccc2471b7b95e29b7cfc7938e042bf56e281
git.kernel.org/...c/32df687e129ef0f9afcbcc914f7c32deb28fd481
git.kernel.org/...c/3945c799f12b8d1f49a3b48369ca494d981ac465
Support options